messages from 2020-08-20 04:42:22 to 2020-08-24 09:08:53 UTC [more...]
[PATCH v6 00/76] x86: SEV-ES Guest Support
2020-08-24 8:55 UTC (34+ messages)
` [PATCH v6 17/76] x86/boot/compressed/64: Don't pre-map memory in KASLR code
` [PATCH v6 31/76] x86/head/64: Setup MSR_GS_BASE before calling into C code
` [PATCH v6 42/76] x86/sev-es: Setup early #VC handler
` [PATCH v6 44/76] x86/sev-es: Setup per-cpu GHCBs for the runtime handler
` [PATCH v6 46/76] x86/sev-es: Adjust #VC IST Stack on entering NMI handler
` [PATCH v6 47/76] x86/dumpstack/64: Add noinstr version of get_stack_info()
` [PATCH v6 49/76] x86/sev-es: Add Runtime #VC Exception Handler
` [PATCH v6 50/76] x86/sev-es: Wire up existing #VC exit-code handlers
` [PATCH v6 51/76] x86/sev-es: Handle instruction fetches from user-space
` [PATCH v6 53/76] x86/sev-es: Handle MMIO String Instructions
` [PATCH v6 54/76] x86/sev-es: Handle MSR events
` [PATCH v6 55/76] x86/sev-es: Handle DR7 read/write events
` [PATCH v6 56/76] x86/sev-es: Handle WBINVD Events
` [PATCH v6 57/76] x86/sev-es: Handle RDTSC(P) Events
` [PATCH v6 58/76] x86/sev-es: Handle RDPMC Events
` [PATCH v6 59/76] x86/sev-es: Handle INVD Events
` [PATCH v6 60/76] x86/sev-es: Handle MONITOR/MONITORX Events
` [PATCH v6 61/76] x86/sev-es: Handle MWAIT/MWAITX Events
` [PATCH v6 62/76] x86/sev-es: Handle VMMCALL Events
` [PATCH v6 63/76] x86/sev-es: Handle #AC Events
` [PATCH v6 64/76] x86/sev-es: Handle #DB Events
` [PATCH v6 65/76] x86/paravirt: Allow hypervisor specific VMMCALL handling under SEV-ES
` [PATCH v6 66/76] x86/kvm: Add KVM "
` [PATCH v6 67/76] x86/vmware: Add VMware specific handling for VMMCALL "
` [PATCH v6 68/76] x86/realmode: Add SEV-ES specific trampoline entry point
` [PATCH v6 69/76] x86/realmode: Setup AP jump table
` [PATCH v6 70/76] x86/smpboot: Setup TSS for starting AP
` [PATCH v6 71/76] x86/head/64: Don't call verify_cpu() on starting APs
` [PATCH v6 72/76] x86/head/64: Rename start_cpu0
` [PATCH v6 73/76] x86/sev-es: Support CPU offline/online
` [PATCH v6 74/76] x86/sev-es: Handle NMI State
` [PATCH v6 75/76] x86/efi: Add GHCB mappings when SEV-ES is active
` [PATCH v6 76/76] x86/sev-es: Check required CPU features for SEV-ES
[PATCH v2] KVM: LAPIC: Narrow down the kick target vCPU
2020-08-24 5:15 UTC (2+ messages)
[PATCH v3 00/12] Allow userspace to manage MSRs
2020-08-24 1:35 UTC (20+ messages)
` [PATCH v3 04/12] KVM: x86: Add ioctl for accepting a userspace provided MSR list
` [PATCH v3 05/12] KVM: x86: Add support for exiting to userspace on rdmsr or wrmsr
` [PATCH v3 07/12] KVM: x86: Ensure the MSR bitmap never clears userspace tracked MSRs
[PATCH 1/2] KVM: LAPIC: Fix updating DFR missing apic map recalculation
2020-08-24 1:25 UTC (2+ messages)
[PATCH v2 1/2] KVM: LAPIC: Return 0 when getting the tscdeadline timer if the lapic is hw disabled
2020-08-24 1:04 UTC (3+ messages)
` [PATCH v2 2/2] KVM: LAPIC: Guarantee the timer is in tsc-deadline mode when setting
[PATCH] KVM: LAPIC: Don't kick vCPU which is injecting already-expired timer
2020-08-24 0:19 UTC (3+ messages)
[PATCH 0/8] Convert the intel iommu driver to the dma-iommu api
2020-08-24 0:04 UTC (7+ messages)
Modi: Регистрационная информация
2020-08-23 19:48 UTC
Modi: Регистрационная информация
2020-08-23 19:48 UTC
Modi: Регистрационная информация
2020-08-23 19:49 UTC
Modi: Регистрационная информация
2020-08-23 19:49 UTC
Modi: Регистрационная информация
2020-08-23 19:48 UTC
Modi: Регистрационная информация
2020-08-23 19:49 UTC
Modi: Регистрационная информация
2020-08-23 19:48 UTC
Modi: Регистрационная информация
2020-08-23 19:49 UTC
Modi: Регистрационная информация
2020-08-23 19:49 UTC
[PATCH] MIPS: VZ: Only include loongson_regs.h for CPU_LOONGSON64
2020-08-22 18:24 UTC (10+ messages)
[GIT PULL] KVM changes for Linux 5.9-rc2
2020-08-22 17:32 UTC (2+ messages)
[PATCH] x86/entry/64: Disallow RDPID in paranoid entry if KVM is enabled
2020-08-22 16:42 UTC (16+ messages)
[PATCH v5 00/75] x86: SEV-ES Guest Support
2020-08-22 16:30 UTC (10+ messages)
[Bug 207489] New: Kernel panic due to Lazy update IOAPIC EOI on an x86_64 *host*, when two (or more) PCI devices from different IOMMU groups are passed to Windows 10 guest, upon guest boot into Windows, with more than 4 VCPUs
2020-08-22 14:34 UTC (3+ messages)
` [Bug 207489] "
[RFC PATCH 0/5] KVM: arm64: Add pvtime LPT support
2020-08-22 10:31 UTC (5+ messages)
vfio-pci regression on x86_64 and Kernel v5.9-rc1
2020-08-22 8:46 UTC
[PATCH] KVM: VMX: fix crash cleanup when KVM wasn't used
2020-08-22 3:40 UTC (3+ messages)
[RFC 0/7] KVM: PKS Virtualization support
2020-08-22 3:28 UTC (8+ messages)
` [RFC 2/7] KVM: VMX: Expose IA32_PKRS MSR
[PATCH v2] KVM: nVMX: Update VMCS02 when L2 PAE PDPTE updates detected
2020-08-22 3:25 UTC (2+ messages)
[PATCH v2 0/3] KVM: x86: KVM_MEM_PCI_HOLE memory
2020-08-22 3:19 UTC (7+ messages)
` [PATCH v2 2/3] KVM: x86: introduce "
[PATCH v10 00/16] s390/vfio-ap: dynamic configuration support
2020-08-21 19:56 UTC (17+ messages)
` [PATCH v10 01/16] s390/vfio-ap: add version vfio_ap module
` [PATCH v10 02/16] s390/vfio-ap: use new AP bus interface to search for queue devices
` [PATCH v10 03/16] s390/vfio-ap: manage link between queue struct and matrix mdev
` [PATCH v10 04/16] s390/zcrypt: driver callback to indicate resource in use
` [PATCH v10 05/16] s390/vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v10 06/16] s390/vfio-ap: introduce shadow APCB
` [PATCH v10 07/16] s390/vfio-ap: sysfs attribute to display the guest's matrix
` [PATCH v10 08/16] s390/vfio-ap: filter matrix for unavailable queue devices
` [PATCH v10 09/16] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
` [PATCH v10 10/16] s390/vfio-ap: allow configuration of matrix mdev in use by a KVM guest
` [PATCH v10 11/16] s390/vfio-ap: allow hot plug/unplug of AP resources using mdev device
` [PATCH v10 12/16] s390/zcrypt: Notify driver on config changed and scan complete callbacks
` [PATCH v10 13/16] s390/vfio-ap: handle host AP config change notification
` [PATCH v10 14/16] s390/vfio-ap: handle AP bus scan completed notification
` [PATCH v10 15/16] s390/vfio-ap: handle probe/remove not due to host AP config changes
` [PATCH v10 16/16] s390/vfio-ap: update docs to include dynamic config support
[Patch 0/4] Defer page pinning for SEV guests until guest pages touched
2020-08-21 18:16 UTC (11+ messages)
` [Patch 2/4] KVM:SVM: Introduce set_spte_notify support
[PATCH AUTOSEL 5.8 36/62] MIPS: KVM: Limit Trap-and-Emulate to MIPS32R2 only
2020-08-21 16:13 UTC
[PATCH v2] x86/entry/64: Do not use RDPID in paranoid entry to accomodate KVM
2020-08-21 15:35 UTC (4+ messages)
device compatibility interface for live migration with assigned devices
2020-08-21 14:52 UTC (23+ messages)
` [ovirt-devel] "
[kvm-unit-tests PATCH 0/2] Use same test names in the default and the TAP13 output format
2020-08-21 14:16 UTC (7+ messages)
` [kvm-unit-tests PATCH 1/2] runtime.bash: remove outdated comment
` [kvm-unit-tests PATCH 2/2] Use same test names in the default and the TAP13 output format
[PATCH v6 00/15] vfio: expose virtual Shared Virtual Addressing to VMs
2020-08-21 13:09 UTC (16+ messages)
` [PATCH v6 04/15] vfio/type1: Report iommu nesting info to userspace
` [PATCH v6 07/15] vfio/type1: Add VFIO_IOMMU_PASID_REQUEST (alloc/free)
` [PATCH v6 08/15] iommu: Pass domain to sva_unbind_gpasid()
` [PATCH v6 12/15] vfio/type1: Add vSVA support for IOMMU-backed mdevs
[PATCH v9 0/2] s390: virtio: let arch validate VIRTIO features
2020-08-21 13:08 UTC (7+ messages)
` [PATCH v9 1/2] virtio: let arch advertise guest's memory access restrictions
` [PATCH v9 2/2] s390: virtio: PV needs VIRTIO I/O device protection
[PATCH v2 0/6] KVM: arm64: pvtime: Fixes and a new cap
2020-08-21 13:04 UTC (3+ messages)
[PATCH kvmtool] update_headers.sh: Remove arm architecture
2020-08-21 12:28 UTC (2+ messages)
[PATCH v2 kvmtool] virtio: Fix ordering of virtio_queue__should_signal()
2020-08-21 12:28 UTC (2+ messages)
[kvm-unit-tests PATCH 0/4] s390x: Add Protected VM support
2020-08-21 11:47 UTC (3+ messages)
` [kvm-unit-tests PATCH 4/4] s390x: add "
[PATCH v2 0/7] KVM: nSVM: ondemand nested state allocation + smm fixes
2020-08-21 0:43 UTC (13+ messages)
` [PATCH v2 1/7] KVM: SVM: rename a variable in the svm_create_vcpu
` [PATCH v2 2/7] KVM: nSVM: rename nested 'vmcb' to vmcb12_gpa in few places
` [PATCH v2 3/7] KVM: SVM: refactor msr permission bitmap allocation
` [PATCH v2 4/7] KVM: x86: allow kvm_x86_ops.set_efer to return a value
` [PATCH v2 5/7] KVM: nSVM: more strict smm checks
` [PATCH v2 6/7] KVM: emulator: more strict rsm checks
` [PATCH v2 7/7] KVM: nSVM: implement ondemand allocation of the nested state
[REGRESSION] x86/entry: Tracer no longer has opportunity to change the syscall number at entry via orig_ax
2020-08-21 0:35 UTC (5+ messages)
[PATCH V2] vfio dma_map/unmap: optimized for hugetlbfs pages
2020-08-20 18:38 UTC (2+ messages)
[PATCH v13 0/9] Enable ptp_kvm for arm64
2020-08-20 9:43 UTC (6+ messages)
` [PATCH v13 2/9] arm/arm64: KVM: Advertise KVM UID to guests via SMCCC
[PATCH 0/8] KVM: nSVM: ondemand nested state allocation + nested guest state caching
2020-08-20 11:52 UTC (23+ messages)
` [PATCH 1/8] KVM: SVM: rename a variable in the svm_create_vcpu
` [PATCH 2/8] KVM: nSVM: rename nested 'vmcb' to vmcb_gpa in few places
` [PATCH 3/8] KVM: SVM: refactor msr permission bitmap allocation
` [PATCH 4/8] KVM: x86: allow kvm_x86_ops.set_efer to return a value
` [PATCH 5/8] KVM: nSVM: implement ondemand allocation of the nested state
` [PATCH 6/8] SVM: nSVM: cache whole nested vmcb instead of only its control area
` [PATCH 7/8] KVM: nSVM: implement caching of nested vmcb save area
` [PATCH 8/8] KVM: nSVM: read only changed fields of the nested guest data area
[PATCH v2 0/2] KVM: arm64: Filtering PMU events
2020-08-20 7:37 UTC (8+ messages)
` [PATCH v2 1/2] KVM: arm64: Add PMU event filtering infrastructure
[PATCH 0/2] KVM: arm64: Fix sleeping while atomic BUG() on OOM
2020-08-20 7:26 UTC (4+ messages)
[GIT PULL] VFIO fix for v5.9-rc2
2020-08-20 4:42 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox